New IBM Network Security Appliance Launched

IBM announced the availability of a new network security appliance, the IBM Security Network Intrusion Prevention System.

IBM has announced a new class of network security appliance that delivers a more granular view of an organization's IT security and delivers a simplified security management interface.
The IBM appliance helps enterprises control new risks posed by social media and Web browsing, IBM said. The next-generation intrusion-prevention appliance helps users address advanced attacks targeting their organization, providing visibility into exactly what applications are being used on the network, where users are going on the Web, with the ability to monitor and control this activity, resulting in improved security and reduced operational costs, IBM said.

The new IBM Security Network Protection XGS 5000 builds on the core security features found in IBM Security Network Intrusion Prevention System, including protection for "zero-day" exploits, by adding new levels of visibility and control over the network, applications, data and users to improve security by preventing misuse and identifying previously undetectable threats.

IBM's Network Security Protection incorporates global threat intelligence from X-Force, including a Web filter database of more than 15 billion URLscapable of monitoring and categorizing millions of Web servers and applications each day to provide superior protection against the changing threat landscape. Once organizations are aware of the nature of activity on their network, the new application control features enable users to have granular control over what is happening on their network; this means granular user and group-level control over which applications and Websites are permitted, and how they are used down to individual actions or activities within these applications and sites, IBM said.
The escalation of targeted attacks and rapid adoption of mobility, cloud and social media requires companies to take a new approach to securing the enterprise," Brendan Hannigan, general manager of the IBM Security Systems Division, said in a statement. "IBM is uniquely positioned to help our customers address these challenges with our new Advanced Threat Protection Platform that combines total security intelligence from within the enterprise, exhaustive external threat intelligence and the new XGS appliance that delivers fine-grained activity detection and control.
Indeed, IBM says the appliances integration with IBMs Advanced Threat Protection Platform, which uses anomaly-detection and event-correlation capabilities, enables users to better address more complex attacks such as advanced persistent threats (APTs). IBM Security customers can also choose tightly integrated solutions that use optimized security products and security intelligence tools, including analytics. In addition, IBM's Managed Security Services can provide constant monitoring and management of a customer's IT environment to augment or replace in-house expertise, IBM said.

"IBM Security Network Protection gives us a better view of our security posture and what is taking place on our network, Peter Param, manager of network and security at St. Vincents Hospital in Australia, said in a statement. With more than 1,000 distinct users, as well as sizable traffic from streaming video and social media sites, knowing which employees are authorized to access particular sites throughout the day, as well as knowing which applications are being used on our network, is critical in optimizing it as well as increasing our security posture.
The IBM Security Network Protection XGS 5000 is the newest addition to IBMs Advanced Threat Protection Platform. The solution helps protect against network-based threats masked in common network traffic, and prevents attackers from exploiting vulnerabilities at the network, host and application layers, IBM said.
IBM also said its protection engine is built upon years of security intelligence gathered by X-Force Research, and can stop entire classes of attacks, including new and unknown threats, without updates. Unlike the IBM offering, most solutions available today match individual protection signaturesa process that is too slow to stop evolving threats and results in higher rates of false positives and false negatives, the company said.

Darryl K. Taft covers the development tools and developer-related issues beat from his office in Baltimore. He has more than 10 years of experience in the business and is always looking for the next scoop. Taft is a member of the Association for Computing Machinery (ACM) and was named 'one of the most active middleware reporters in the world' by The Middleware Co. He also has his own card in the 'Who's Who in Enterprise Java' deck.